Unfortunately the string of phishing attacks using domain-confusionand legitimate-looking emails continues. This is the same attack PyPI saw a few months agoand targeting many other open source repositoriesbut with a different domain name. Judging from this, we believe this type of campaign will continuewith new domains in the future.
In short, there’s a new phishing campaigntargeting PyPI users occurring right now. The email asks you to “verify their email address”for “account maintenance and security procedures” with a note that your account may be suspended.This email is fake, and the link goes to pypi-mirror.org
If you have already clicked on the link and provided your credentials, we recommend changing yourpassword on PyPI immediately. Inspect your account’s Security History for anything unexpected.Report suspicious activity, such as potential phishing campaigns against PyPI, to security@pypi.org
.
There’s no quick-and-easy method for PyPI maintainers to completelyhalt this sort of attack short of requiring phishing-resistant 2FA (such as hardware tokens).Below are the following steps we’re taking to keep users safe:
If you are a maintainer of a package on PyPI, you can help protect your users by adopting the following practices:
SummaryI recently responded to an attack campaign where malicious actors injected code into GitHub Actions…
Internet security is leveling up with MPIC. While your organization likely won’t need to do…
Sept. 10: Get actionable insights from 20+ global experts as they discuss PQC readiness assessments,…
SummaryPyPI now checks for expired domains to prevent domain resurrection attacks,a type of supply-chain attack…
PyPI now serves project status markers in its standardindex APIs. This allows downstream consumers (like…
Changes to the S/MIME Certificate Baseline Requirements add support for automated mailbox validation (via the…
This website uses cookies.